Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Selection of remotely located servers for computer security operations

a technology for computer security and remote location, applied in the field of computer security, can solve problems such as phishing, denial of service attacks, spam, etc., and achieve the effects of reducing the risk of phishing, preventing phishing attacks, and preventing phishing attacks

Active Publication Date: 2011-12-27
TREND MICRO INC
View PDF35 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0006]In one embodiment, a client computer is configured to perform computer security operation services, such as malicious code scanning and protection against online threats, using one of a plurality of server computers. The client computer may be configured to determine an operational state of the server computers and determine a protection status of the client computer resulting from use of a server computer of a particular operational state. The protection status may have one of at least three levels and indicate vulnerability of the client computer. The client computer may determine the operational state of a server computer based on available bandwidth for network communication between the client computer and the server computer. The client computer may be configured to allow for automatic or manual selection of another server computer when the currently selected server computer results in the client computer having a protection status below a threshold level.

Problems solved by technology

Online threats may include malicious websites, network intrusion, denial of service attacks, pharming, phishing, spam, eavesdropping, and various online fraudulent schemes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Selection of remotely located servers for computer security operations
  • Selection of remotely located servers for computer security operations
  • Selection of remotely located servers for computer security operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]In the present disclosure, numerous specific details are provided, such as examples of apparatus, components, and methods, to provide a thorough understanding of embodiments of the invention. Persons of ordinary skill in the art will recognize, however, that the invention can be practiced without one or more of the specific details. In other instances, well-known details are not shown or described to avoid obscuring aspects of the invention.

[0019]Being computer-related, it can be appreciated that some components disclosed herein may be implemented in hardware, software, or a combination of hardware and software (e.g., firmware). Software components may be in the form of computer-readable program code stored in a computer-readable storage medium, such as memory, mass storage device, or removable storage device. For example, a computer-readable storage medium may comprise computer-readable program code for performing the function of a particular component. Likewise, computer mem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A client computer may be configured to perform computer security operation services, such as malicious code scanning and protection against online threats, using one of several remotely located server computers. The client computer may be configured to determine an operational state of the server computers and determine a protection status of the client computer resulting from use of a server computer of a particular operational state. The protection status may have one of at least three levels and indicate vulnerability of the client computer. The client computer may determine the operational state of a server computer based on available bandwidth for network communication between the client computer and the server computer. The client computer may be configured to allow for automatic or manual selection of another server computer when the currently selected server computer results in the client computer having a protection status below a threshold level.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates generally to computer security, and more particularly but not exclusively to methods and apparatus for performing computer security operations using remote services.[0003]2. Description of the Background Art[0004]Generally speaking, computer security operations involve protection of computers and user information against malicious codes and online threats. Malicious codes may include computer viruses, trojans, spywares, worms, rootkits, and the like.[0005]Online threats may include malicious websites, network intrusion, denial of service attacks, pharming, phishing, spam, eavesdropping, and various online fraudulent schemes. Traditional computer security products may include a client-based scan engine and a pattern file that is periodically updated to keep it current. Both the scan engine and the pattern file are on a customer client or server computer. For example, the scan engine may be c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F12/14
CPCH04L67/101G06F21/56H04L63/145H04L43/0817H04L43/0888
Inventor CHUN, LOU JUCHAN, CHIA-WENLIN, SAMWANG, JAYLU, CHIH-KANGYEN, SEAN
Owner TREND MICRO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products